Average salary: $49,894 /yearly
More statsSearch Results: 134 vacancies
...Work type: Fixed Term
Join La Trobe University as Chief Information Security Officer (CISO)
La Trobe University is on the lookout for a dynamic and experienced Chief Information Security Officer (CISO) to champion our cyber security initiatives and protect our institution...
Suggested
Fixed term contract
Work at office
...Do you want to work for a global leader in the security space?
We're excited to offer a fantastic opportunity for a Cyber Security... ..., endpoint detection and response (EDR) systems, security information and event management (SIEM) platforms, email and web proxies, and...
Suggested
Full time
Hybrid work
...Specifically, the role works across Monash to protect the University’s information assets and systems by providing specialised advice, oversight... ...for evaluating risks to the organisation to ensure that security risk is within Monash’s established risk appetite and in line with...
Suggested
Full time
Hybrid work
Flexible hours
Sunday
...exciting opportunity to utilise and develop your experience in Cyber Security in this newly created position. This role will work closely... ...opportunity for those wanting to take the next step in their information/cyber security career.
The Cyber Security Analyst plays a...
Suggested
Full time
Fixed term contract
Immediate start
Flexible hours
...problems, together
Deliver with speed and agility
Be candid and kind
About the opportunity
Reporting to the Information Security Manager, the Senior Security Engineer will be responsible for many of the key functions around security operations and architecture...
Suggested
Full time
Temporary work
Summer work
Remote job
Hybrid work
Holiday work
Flexible hours
...servers and heavy forwarders. A strong understanding of Enterprise Security and SOAR is required.
The splunk Engineer will demonstrate... ...Onboard new data/log sources and run queries and searches to inform requests.
• Perform data quality and data model assessments...
Suggested
Permanent employment
Full time
Worldwide
Hybrid work
Flexible hours
...candidates for the following position based in Melbourne or Sydney :
Application Security Architect
What can you expect?
Mercer Information Security is looking for an Application Security Architect to play a key role in ensuring the...
Suggested
Full time
Work at office
Local area
Remote job
Hybrid work
Flexible hours
3 days week
1 day week
...care every time' to life. We are seeking an experienced Cyber Security Architect for this full-time, fixed term position (ending 30 June... ...Manager Cyber Security, this position is responsible for information and cyber security architecture, providing strategic critical expertise...
Suggested
Full time
Fixed term contract
Hybrid work
...Our focus is on helping our members enjoy the retirement they've worked hard for.
Do you have a passion for information and cyber security?
Do you want to be part of a talented team and a unique opportunity that blends leadership and technical skills?...
Suggested
Full time
...Geelong
Salary: $650 - $750
Duration: 7 Months
The IT Security Operations Analyst will play a pivotal role in ensuring the effective cyber security management of the organization's information systems, networks, and data. They will be responsible for...
Suggested
Contract work
...continuously looking at ways to develop, maintain and support security controls across the organisation. We are on the lookout for a technical... ...ensure KPI’s and targets are met.
~2+ years’ experience in information security or a related field.
~Understanding and experience...
Suggested
Online
Flexible hours
IT infrastructure, data stores, IT security, systems, and communications equipment
~ Administration and management of Windows (Desktop... ....
~ Be fully compliant with the Australian government Information Security Manual and ACSC Essential 8 as it applies to the business...
Suggested
Full time
Work at office
Hybrid work
...continuously looking at ways to develop, maintain and support security controls across the organisation which is why we are on the lookout... ...~Utilising your extensive knowledge in security technologies, information systems, processes, and procedures, you will play an...
Suggested
Flexible hours
...services company with leading capabilities in digital, cloud and security. Find out more about us at
Flexible work... ...concerns.
Support and validate the discovery of sensitive information residing within data repositories (e.g., GitHub, network drives...
Suggested
Full time
Flexible hours
...On-call rotation schedule
What you bring
Bachelor’s Degree in Computer Science, Information Systems, Computer Engineering, or related field
Experience implementing security on AWS and Azure with VPC, IAM, Security Groups, UTM solutions, NACLS, etc.), provision...
Suggested
Permanent employment
Full time
Worldwide
Flexible hours
...requirements or by making an adjustment to our hiring process, please contact us at ****@*****.***
Information Security and Compliance
Capgemini Australia has developed and manages, process orientated Management Systems compliant to the...
Full time
Flexible hours
..., Audit and Governance uplift program that will not only improve overall the organizational understanding of the importance of Information Security but also allow the organisation to improve the effectiveness of combatting customer risks.
The Chief Technology Officer...
Full time
$150,000
...integrated (hardware and software) product delivery at the forefront of embedded machine learning/AI, advanced analytics and enterprise information security.
Who are we looking for?
XY Sense has experienced exceptional growth over the past two years; 3X our sensor install...
Full time
Work at office
Flexible hours
...innovation, its integrated solutions deliver value across enterprise security performance, digital supply chains, cyber insurance, and data... ...market. Bitsight Security Ratings help companies manage the
information security risk associated with their third parties to understand...
Remote job
Full time
...assist the development of realistic business requirements that will support the business cases
Maintain awareness of current Information Security standards and ensures all activities comply with the standards
Identify risks, issues, and dependencies in the development of...
Contract work
Online